CN102187599A - Security protected non-access stratum protocol operation supporting method in a mobile telecommunication system - Google Patents

Security protected non-access stratum protocol operation supporting method in a mobile telecommunication system Download PDF

Info

Publication number
CN102187599A
CN102187599A CN2009801409751A CN200980140975A CN102187599A CN 102187599 A CN102187599 A CN 102187599A CN 2009801409751 A CN2009801409751 A CN 2009801409751A CN 200980140975 A CN200980140975 A CN 200980140975A CN 102187599 A CN102187599 A CN 102187599A
Authority
CN
China
Prior art keywords
key
new
mme
request message
place
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2009801409751A
Other languages
Chinese (zh)
Other versions
CN102187599B (en
Inventor
徐庆珠
崔成豪
金重铉
俞在天
裵恩希
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Electronics Co Ltd
Original Assignee
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics Co Ltd filed Critical Samsung Electronics Co Ltd
Publication of CN102187599A publication Critical patent/CN102187599A/en
Application granted granted Critical
Publication of CN102187599B publication Critical patent/CN102187599B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0433Key management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a method and system for the management of the mobility, the management of an idle mode, the registration management (management of attachment and detachment), and the location management (management of tracking area) of a terminal by using a non-access stratum (i.e., network stratum, hereinafter referred to as "NAS") in a mobile telecommunication network.; To this end, the method for the management of mobility, the management of an idle mode, the registration management, and the location management of a terminal by using a NAS protocol, i.e., messages, according to an embodiment of the present invention, includes a terminal (hereinafter, referred to as "UE") and a mobility management entity (hereinafter, referred to as "MME"), and addresses to a method for efficiently processing security protected NAS messages if received messages are security protected NAS messages, in a case of transmitting or receiving messages serving as EMM (EPS Mobility Management) messages, i.e., mobility management messages, in a network such as an EPS (Evolved Packet System) of 3GPP, when the terminal performs handover in an active mode, performs location management in an idle mode, and registers to a network,; thereby achieving improved efficiency in the mobility management, the position management, and the registration management of a terminal.

Description

The non-access aspect protocol operation support method of safeguard protection in mobile communication system
Technical field
The present invention relates to be used for the method for the subscriber equipment of management of mobile telecommunication system, specifically, relate to the method for the mobility, position and the login management that are used to utilize the NAS agreement to support subscriber equipment (UE) effectively.
Background technology
As one of representational mobile communication standard tissue, third generation partner plan (3GPP) has developed grouping system (the Evolved Packet System of evolution, EPS) and defined Mobility Management Entity (Mobility Management Entity, MME).For the mobility of the high speed that satisfies such next generation mobile communication system and the safety requirements of reinforcement, proposed to improve the 3G system of the NAS agreement, particularly 3GPP that are used for traditional mobile communication system.
Yet, NAS agreement and be jejune for the accuracy level of the aforementioned functional that provides support and the definition of character based on mobility, position and the login management scheme of the NAS of NAS agreement.And the program of current definition and message can not be operated (malfunctioned) about mobility, position and/or login management in real system, and have produced unclear problem.Therefore, need be to the role's of the program of mobility, position and the login management of effective support NAS agreement, safeguard protection and UE and MME definition.
Summary of the invention
Be used on the NAS message of utilizing safeguard protection such as the mobile communication system of the evolution of 3GPP EPS, protection ground and support the method for mobility, position and login management effectively in order to solve prior art problems, to the invention provides.And, the operation of NAS agreement that the present invention has utilized NAS message definition between UE and the MME.Therefore, the invention provides the method for mobility, position and the login management of the UE that is used to support to use the NAS agreement, even between 3GPP EPS and other wireless access technologys (that is, non-3 GPP system), and in 3GPP EPS.
The invention provides and be used for utilizing non-access aspect (NAS) agreement to support the method for the mobile management of UE, idle pulley management, login management (connecting and the disconnection management) and location management (tracing area management) at mobile communications network.Just, the invention provides and be used to use NAS agreement (that is NAS message) to support the method for mobile management, idle pulley management, login management and the location management of UE.Mobile communication system of the present invention comprises subscriber equipment (UE) and Mobility Management Entity (MME); and proposed to carry out the location management of switching (handover) under the enable mode, idle pulley and during to the login of network, in such as the network of 3GPP EPS, effectively utilize the method for the NAS message of safeguard protection as UE.
According to an aspect of the present invention, the method that is used for handling in mobile communication system the state information of UE comprises: at the UE place, to new MME transmit status conversion request message; MME place new receives old key information from old MME; And, after using old key information analysis request message, send response message to UE at new MME place.Preferably, old key information comprises KSIasme and Kaseme.
Preferably, this method also comprises: at new MME place, send the NAS Security Mode Command message to UE, this NAS Security Mode Command message comprises the new key information that generates when explaining the request message failure; And, send the response of the NAS Security Mode Command message that generates for the new key information that utilizes UE to new MME at the UE place.
Preferably, the new key information that generates by new MME comprise the NAS cryptographic key (NAS cipher key, KNASenc) and Integrity Key (KNAsint); The NAS Security Mode Command message comprises secure identifier (KSI), UE security capabilities, the cryptographic algorithm that will use and integral algorithm; And comprise cryptographic key (KNASenc) and the Integrity Key (KNAsint) that generates based on basic security key (KASME) by the new key information that UE generates by secure identifier (KSI) index of NAS Security Mode Command message.Preferably, this method also comprises: at new MME place, when utilizing old key to explain the request message failure, send user authentication request message, and reply this user authentication request message at the UE place.Preferably, user authentication request message comprises authentication vector (AUTN) and safe key identifier (KSIASME).
Preferably, the state exchange request message is handoff request message, TAU request message and is connected in (disconnection) request message one.
According to another aspect of the present invention, be used for comprising:, utilize new key to carry out the state exchange request message of safeguard protection to new MME transmission at the UE place in the method for mobile communication system process state information; At new MME place, by sending user authentication request message, response status conversion request message to new MME; At new MME place, generate new key and have the NAS Security Mode Command message of new key to the UE transmission; And,, and reply the NAS Security Mode Command message based on the new new key of key information generation of new MME at the UE place.
According to another aspect of the present invention, be used for handling the method for switching and comprise:, send passing on of old key information to new MME and reorientate request message with UE at old MME place in mobile communication system; At the UE place, utilize old key to carry out the TAU request message of safeguard protection to new MME transmission; And, utilize old key to explain the TAU request message at new MME place.Preferably, this method also comprises: at new MME place, when utilizing old key to explain the failure of TAU request message, send user authentication request message, and reply user authentication request message at the UE place; At new MME place, generate new key, and send the NAS Security Mode Command message that has about the information of new key to UE; At the UE place, use the new key information of new MME to generate new key, and reply the NAS safe mode command; And, send the TAU request message that utilizes new key to carry out safeguard protection, and utilize new key handling message at new MME place to new MME at the UE place.
According to another aspect of the present invention, be used for comprising:, utilize old key to carry out the TAU request message of safeguard protection to new MME transmission at the UE place in the position method for updating of mobile communication system processing UE; At new MME place,, and receive old key information to the old MME request information relevant with the old key of UE; And at new MME place, utilize old key to explain the TAU request message, and the TAU that utilizes old key to carry out safeguard protection to the UE transmission accepts message.Preferably, this method also comprises: at new MME place, when utilizing old key to explain the failure of TAU request message, send user authentication request message, and reply user authentication request message at the UE place; At new MME place, generate new key, and send the NAS Security Mode Command message that has about the information of new key to UE; At the UE place,, and reply the NAS safe mode command based on the new new key of key information generation of new MME; And, send the TAU request message that utilizes new key to carry out safeguard protection, and utilize new key handling message at new MME place to new MME at the UE place.
According to a further aspect of the invention, the method that is used for handling in mobile communication system the login of UE comprises: at UE place, utilize old key to carry out the login request message of safeguard protection to new MME transmission; At new MME place,, and receive old key information to the old MME request information relevant with the old key of UE; And, explain login request message, and accept message to the login that the UE transmission utilizes old key to carry out safeguard protection at new MME place.Preferably, this method also comprises: at new MME place, when utilizing old key to explain the login request message failure, send user authentication request message, and reply user authentication request message; At new MME place, generate new key, and send the NAS Security Mode Command message that has about the information of new key to UE; At the UE place,, and reply the NAS Security Mode Command message based on the new new key of key information generation of new MME; And, send the login request message of utilizing new key to carry out safeguard protection, and utilize new key handling message at new MME place to new MME at the UE place.
Beneficial effect
As previously mentioned, the present invention relates in mobile communication system, use the method and system of idle pulley management, login management (connecting and the disconnection management) and the location management (tracing area management) of non-access aspect (NAS) support UE.Use the NAS agreement to support the method for mobile management, idle pulley management, login management and location management to comprise subscriber equipment (UE) and Mobility Management Entity (MME); and when having proposed in to send or to receive EPS mobile management (EMM) as mobile management message such as the network of 3GPP EPS; particularly under enable mode under the switching of UE, the idle pulley under the situation of the login of the location management of UE, UE and network; be used for handling effectively the method for the NAS message of safeguard protection, thereby improve mobility, position and login management efficient.
Description of drawings
Fig. 1 and Fig. 2 illustrate to be used for the structure switched in mobile communication system and the accompanying drawing of operation according to an embodiment of the invention;
Fig. 3 and Fig. 4 illustrate to be used for according to an embodiment of the invention carrying out the structure of location management and the accompanying drawing of operation in mobile communication system;
Fig. 5 and Fig. 6 illustrate the structure of the logging program that is used for UE according to an embodiment of the invention and the accompanying drawing of operation;
Fig. 7 is the mobile management that MME in the mobile communication system according to an embodiment of the invention is shown to Fig. 9, the flow chart of location management and login management program; And
Figure 10 illustrates the flow chart of mobile management, location management and the login management program of UE in an embodiment of the present invention.
Embodiment
With reference to accompanying drawing one exemplary embodiment of the present invention is described in detail.Identical reference number is used in reference to same or analogous part of generation in the accompanying drawings all the time.The known function of institute's combination here and the detailed description of structure will be omitted, to avoid fuzzy theme of the present invention.Following term is to consider that function in the present invention defines, and its implication can change according to user or operator's intention or according to convention.Therefore, the definition of term must be explained based on the whole content of this specification.
In the following description, any one during term " state exchange request message " is meant handoff request message, tracking area update (TAU) request message and is connected (disconnection) request message.The relevant information of safe key that term " old key " is meant and uses in the old MME (serving MME) that UE connected, and term " new key " be meant with will be by the safe key relevant information of UE according to new MME (target MME) use that state exchange connected.
Term " old key information " is meant the information that receives from old MME; and comprise the security information such as basic security key identifier (KSIASME) and basic security key (KASME); and KASME (Key access security management entity; key access security management entity) can comprise the cryptographic key (KNASenc) that is used to encrypt NAS message; the Integrity Key (KNASint) that is used for the integrity protection of NAS message; and the safe key that is used to generate the Node B key (KeNB) of evolution, the Node B key (KeNB) of this evolution is used for the message at wave point place protection AS (access aspect).
Term " user authentication request message " is meant the authentication message that is used for generating new key between new MME and UE, and can comprise certification mark (authentication token, AUTN) (as authentication vector) and secure identifier (KSIASME).
Term " NAS Security Mode Command message " is meant that new MME sends to the message of UE after creating new key, and can comprise that key set index (key set index), conduct are about UE security capabilities, the cryptographic algorithm that will use of the information of the security algorithm that UE supported and the integral algorithm that will use.
The invention provides the NAS agreement that is used for using between UE and the MME and support the method for mobile management, location management and login management in mobile communication system.Though describe at 3GPP EPS system, the present invention can be applied to use other mobile communication system of NAS.
Though the embodiment of Fig. 1 is directed to the situation that has two 3GPP EPS networks, be to use that NAS the present invention can be applied to from 3GPP EPS to another 3GPP EPS, the switching of the UE of 3GPP UMTS network, 3GPPGPRS network, WiMAX network or 3GPP2 Radio Access Network.Support the method for mobile management, location management and login management can be applied to have the mobile communication system of the other types of similar techniques background and channel format according to use according to the present invention NAS agreement, and do not break away from the spirit and scope of the present invention.
Fig. 1 is the view that the switching situation (situation) in the mobile communication system environment according to an embodiment of the invention is shown.In this embodiment, be described with 3GPPEPS.
With reference to figure 1, the node base station of evolution (below, be called E Node B or eNB interchangeably) 112 be positioned at subscriber equipment as the sub-district of the service coverage of eNB (below, be called UE) 110 and set up wireless connections.UE 110 is the terminals via the packet data network of gateway (below, be called service GW or SGW interchangeably) 116 visit such as Internet.In the following description, as the critical network entity of packet data network of the present invention, grouped data network gateway (below, be called PDN GW) 118 roles as home agent (below, be called HA).
Here existence is used at eNB 112 (132) and serves between the GW 116 (136) and ambulant interface and the data path of managing UE between MME114 (134) and service GW 116 (136).In an embodiment of the present invention, UE 110 and MME 114 (134) have the NAS protocol stack, are used to support mobile management, location management, login management and session management.
In an embodiment of the present invention, UE 110 can switch or switch to NW1 from NW2 to NW2143 from NW1141.In an embodiment of the present invention, can there be interface between MME 114 and the MME 134 and between eNB 112 and eNB 132, be used for mobile management, location management and the login of UE 110.
In an embodiment of the present invention, describe the NAS protocol operation that is directed between MME 114 and UE 110, MME is introduced into mobility, position and the session management that is used for UE.Just, be used for the UE 110 of mobility, position and session management and the NAS protocol operation between the MME 114 by evolution so that together with the tightening security property of modification of mobility and conversation management functional.
Fig. 2 illustrates the signaling diagram that is used to utilize the program that the NAS agreement between MME and UE switches in the mobile communication system that makes up according to embodiments of the invention, as shown in fig. 1.
With reference to Fig. 1 and 2, in switching situation, new MME 134 can operate as following three kinds of modes.An embodiment is the situation 2 that comprises the step 151 to 153 of Fig. 2, and wherein new MME 134 uses the security-related information that receives from old MME 114.Another embodiment is corresponding to step 151,153,171 to 179,181,191 and 193 situation 1, except that authentication procedure (171 and 173) and safe mode command program (175 to 181), it also comprises the program that is used to use new security-related information interpretation message.Another embodiment is wherein execution in step 151,153,161,163 and 171 to 181 situation 3, and specifically, when after execution in step 151,153,161 and 163, when step 163 utilizes old safe key to explain that the result of TAU request fails in safety certification, execution in step 171 to 181.
With reference to figure 2,, will pass on the request of reorientating (Forward Relocation Request) message in step 151 serving MME (old MME) 114 and send to target MME (new MME) 134 in situation 2.Here, pass on and reorientate request message and comprise the UE safe context.Pass on when reorientating request message when receiving, target MME 134 will pass on and reorientate response (Forward Relocation Response) message and send to serving MME 114.Then, in step 161, UE 110 sends TAU request (TAU Request) message and gives target MME 134, and this TAU request message carries out safeguard protection by old key.When receiving the TAU request message, target MME uses old key to explain the TAU request message.
As previously mentioned, in the situation 2 of Fig. 2, serving MME (that is the old MME before switching) sends the passing on of UE safe context that comprises target MME (that is, new MME) 134 and reorientates request message.Can comprise the UE safe context.Pass on when reorientating request message when receiving, new MME 134 will pass on and reorientate response message and send to old MME 114.Then, UE 110 will send to new MME 134 by the TAU request message that old key carries out safeguard protection, and this new MME 134 uses old key to explain the TAU request message.
With reference to figure 2, in situation 1, serving MME 114 and target MME 134 execution in step 151 and 153 are passed on to reorientate request message and pass on exchange and are reorientated response message.Next, in step 171, target MME 134 sends to UE 110 with user authentication request (User Authentication Request) message.User authentication request message comprises authentication vector (AUTN) and secure identifier (KSIASME).In response to user authentication request message, in step 173, UE 110 sends to target MME 134 with user authentication response (User Authentication Response) message.When receiving user authentication response message, target MME 134 generates cryptographic key (KNASenc) and Integrity Key (KNASint).
Then, in step 177, the NAS safe mode command (NAS Security Mode Command) that target MME 134 will comprise key set index (KSI), UE security capabilities, cryptographic algorithm, integral algorithm or the like sends to UE 110.When receiving the NAS safe mode command, in step 179, UE 110 generates cryptographic key (KNASint) and Integrity Key (KNASint) based on the KASME by the KSI index.As the result of step 179, target MME 134 shares identical key value with UE 110.Next, in step 181, UE 110 finishes the NAS safe mode (NAS Security Mode Complete) message and sends to target MME 134, and finishes the NAS safe mode command and handle.
Then, UE sends by new key, is the TAU request message that new cryptographic key (KNASenc) or Integrity Key (KNASint) carry out safeguard protection, and target MME 134 uses new key to explain the TAU request message.
As previously mentioned, in the situation 1 of Fig. 2, old MME 114 and new MME 134 exchanges are passed on to reorientate request message and pass on and are reorientated response message.Then, new MME 134 sends the user authentication request message that comprises AUTN and KSIASME to UE 110.In response to user authentication request message, UE sends user authentication response message.When receiving user authentication response message, new MME134 generates cryptographic key (KNASenc) and Integrity Key (KNASint), and the NAS Security Mode Command message is sent to UE 110.At this moment, the NAS Security Mode Command message comprises key set index (KSI), UE security capabilities, cryptographic algorithm, integral algorithm or the like.When receiving the NAS Security Mode Command message, UE 110 generates cryptographic key (KNASint) and Integrity Key (KNASint) based on the KASME by the KSI index, thereby MME 134 shares identical key value with UE 110.Next; UE 110 finishes information with the NAS safe mode and sends to target MME 134; handle so that finish the NAS safe mode command, send by new safe key then, be the new cryptographic key (KNASenc) or the TAU request message of Integrity Key (KNASint) protection.
With reference to figure 2, situation 3 can be the situation that the TAU request message is failed in safety certification in situation 1.That is to say, after execution in step 151,153 and 161, if target MME 134 when step 163 uses old safe key to explain the TAU request message not through safety certification, then target MME 134 and UE 110 are in the processing of step 171 to 181 execution corresponding to situation 2, to generate new safe key and to carry out the NAS safe mode by sharing new safe key.Then, UE 110 sends by new key, is the TAU request message that new cryptographic key (KNASenc) or Integrity Key (KNASint) carry out safeguard protection, and target MME 134 uses new key to explain the TAU request message.
As mentioned above, in the situation 3 of Fig. 2, if via using old safe key to carry out the result that the TAU request message is explained, safety certification is failed, then new MME 134 and UE 110 generate and share new safe key, and use new safe key to handle the TAU request message.
Fig. 3 is the diagrammatic sketch of illustration according to the location management situation in the mobile communication system environment of the embodiment of the invention.In this embodiment, suppose that the mobile communication system is described for 3GPP EPS.
With reference to Fig. 3, the functional entity of mobile communication and structural arrangements environment and Fig. 1's is similar.In Fig. 3, describe and pay close attention to location management function.That is to say, the Fig. 1 that is in activity pattern with UE 110 is different, in the environment of Fig. 3, UE 110 is in idle pulley and is used for conserve power consumption, moves to tracing area 2 (TA2) 243 from tracing area 1 (TA1) 241 after perhaps switching in activity pattern.In this case, need the position of UE be managed.Though tracing area (TA) is accurately positioning UE of unit with the sub-district, it is a kind of notion of management position roughly that is used for.
The signaling diagram of operation that is used for the MME of location management in the mobile communication system that Fig. 4 is an illustration according to the structure as shown in Figure 3 of the embodiment of the invention.In the management scenario of position, new MME 234 can operate in following three kinds of modes.
In the location management situation of situation 2, from step 251 to 259, new MME 234 uses the relevant information of safety that receives from old MME.The location management situation of situation 1 comprises step 251 to 257, step 261 to 269, step 271 and step 181.That is to say that situation 1 also comprises the program that is used to use the relevant information interpretation message of new safety except authentication procedure (step 261 and 263) and safe mode command program (step 265 to 271).In situation 1, when utilizing the old safe context that receives from old MME 214 to explain the trial failure of message, new MME234 and UE 210 carry out authentication and security procedure by step 261 to 271, with generation and shared new security information, and therefore carry out the program of utilizing new security information to send message and utilizing new security information explanation answer message.Situation 3 is wherein to pass through the situation of the message authentication failed of step 251 to 257, and be different from situation 1, when the new safe authentication procedure of needs and when authentication procedure by step 261 to 271 or security procedure failure, in step 291, MME 234 sends positions login refuse information.
The program of situation 1, situation 2 and situation 3 that the operation of the UE be associated with the location management that is used for UE and MME describes is below described in more detail.In situation 2, in step 251, UE 210 will send to new MME 234 by the TAU request message that old key carries out safeguard protection.When receiving the TAU request message, new MME 234 sends to old MME 214 with context request (Context Request) message, to ask the information of relevant UE.In step 257, old MME 214 sends to new MME234 in response to context request message with context response (Context Response) message.Context response information comprises the UE security information, such as basic security key identifier (KSIASME) and basic security key (KASME).Here, KASME (key access security management entity) is used to generate the safe key (KNASenc) of the encipherment protection that is used for NAS message, the enode b key (KeNB) that is used for the NAS Integrity Key (KNASint) of integrity protection and is used to protect access aspect (AS) message.
Next, new MME 234 uses old key to explain the TAU request message (257) that receives from UE 210 in step 251.That is to say, if from UE 210 send to new MME 234, be to utilize old key to carry out safeguard protection as the TAU request message of position log messages, then new MME 234 uses old key to explain the TAU request message in step 257.Here, old key comprises NAS cryptographic key (KNASenc) and NAS Integrity Key (KNASint), is used for protecting the NAS of communication between UE 210 and old MME 214.Next, new MME 234 TAU that will use old key to carry out safeguard protection accepts message and sends to UE 210 (259).
In the situation 2 of the location management of UE, if receive the TAU request message that carries out safeguard protection by old key from UE 210, then new MME 234 sends to old MME 214 to ask the information of relevant UE 210 with context request message.When receiving context request message, the context response information that old MME214 will comprise the security information of the UE such as KSIasme and Kasme sends to new MME 234.New MME 234 uses the old key that carries in the context response information that is sent by old MME 214 to explain from UE 110 and receives the TAU request messages, and the TAU that will use old key to carry out safeguard protection accepts message and sends to UE 210.That is to say; utilize old key to carry out the TAU request message of safeguard protection if receive; then new MME 234 is to the old key information of old MME 214 request UE 210; use old key to explain the TAU request message, and the TAU that will use old key to carry out safeguard protection accept message and send to UE 210 with the login position.
In the situation 1 of the location management that is used for UE, with the mode execution in step 251 to 257 identical with situation 2.If use old key to explain the failure of TAU request message in step 257, then new MME234 sends user authentication request message to UE 210 (261).User authentication request message comprises authentication vector, i.e. AUTN (certification mark, authentication token) and safe key identifier (KSIASME).In response to user authentication request message, UE 210 sends to new MME234 with user authentication response message.
When receiving user authentication response message, new MME 234 generates new security information, i.e. cryptographic key (KNASenc) and Integrity Key (KNASint).Next, new MME 234 sends to UE 210 (267) with the NAS Security Mode Command message.The NAS Security Mode Command message comprises cryptographic key identifier (key set index), UE security capabilities, cryptographic algorithm and integral algorithm.When receiving the NAS Security Mode Command message, UE 210 generates KNASenc and KNASint (269) based on the KASME by the KSI index.As the result of step 269, new MME 234 shares identical cryptographic key value with UE 210.Next, UE 210 finishes message with safe mode and sends to new MME, so that finish NAS safe mode command program (271).When receiving the NAS safe mode when finishing message, new MME 234 accepts message with TAU and sends to UE 210, and this TAU accepts the position login response message that message is to use new cryptographic key (KNASenc) or Integrity Key (KNASint) protection.
If new MME 234 explains by the TAU request message failure of old cryptographic key protection or fails to obtain old key; then new MME 234 generates new safe key (KNASenc and KNASint); and the NAS Security Mode Command message sent to UE 210, thereby UE 210 generates new safe key (KNASenc and KNASint).As the result of NAS safe mode program, new MME 234 shares identical safe key with UE 210.
In the situation 3 of the location management that is used for UE 210, execution in step 251 to 257 and step 261 to 271 by this way: execution in step 261 to 271 when using old key to explain the failure of TAU request message in step 257.Different with situation 2, in situation 3, if the authentication procedure of step 261 and 263 failure, though perhaps authentication procedure success, but any step safe mode command (the Security Mode Command in step 267 to 271, SMC) program makes a mistake, and then UE 210 can have different safe keys with new MME 234.In this case, new MME 234 sends the TAU refuse information to UE (291).
The situation 3 that is being used for position management program, if under the situation of not utilizing old key explanation TAU request message, at new MME and authentification of user between the UE or NAS safe mode procedure failure, then new MME has different safe keys with UE, and therefore new MME sends the TAU refuse information to UE.
Fig. 5 is the diagrammatic sketch of illustration according to UE login scenarios in the mobile communication system environment of the embodiment of the invention.
With reference to figure 5, when UE 310 attempts being connected to network first, can carry out connection (attach) program.Simultaneously, when UE 310 does not need to be connected to the EPS network, can carry out disconnection (detach) program; And when UE 310 has not for a long time not communicated with MME 314 or network operation is determined to cut off when being connected (disconnection), UE 110 can carry out interrupt routine.
Fig. 6 is that UE connects and the signaling diagram of interrupt routine in the mobile communication system that makes up of illustration such as Fig. 5.
With reference to figure 5 and Fig. 6, new MME 334 can be with following three kinds of modes (situation 1 is to situation 3) operation in the UE linker.
In situation 2, can execution in step 351, step 361 to 365 and step 371, and new MME 334 uses the security information that receives from old MME 314.In situation 1, can execution in step 351, step 361 to 365, step 381 to 391 and step 395, and the new security information of use except the safe mode command program of the authentication procedure of step 381 and 383 and step 385 to 391 is explained the program of message.Situation 1 is to use from the old safe context of old MME 314 receptions and explains the situation of message failure, and comprises following program: use authentication and the new security information exchange message of security procedure acquisition and the program of using new security information explanation message by step 381 to 391.Situation 3 is situations of the safety certification failure of message after execution in step 351 and step 361 to 365, and be different from situation 1, when the authentication procedure new safe authentication procedure of needs, that pass through step 381 to 391 or security procedure failure, MME asks to send connection refused message to UE 310 in response to UE login (connecting or disconnection).
Below describe the program of these three kinds of situations in detail.
In the program of situation 2, UE 310 sends to new MME 334 (351) with connection request (Attach Request) message, and this connection request message is to carry out safeguard protection by old key.When receiving connection request message, new MME 334 will discern request (ldentification Request) message and send to old MME 314, with the information (361) of asking relevant UE 310.In response to the identification request message, old MME 314 will discern response (ldentification Response) message and send to new MME 334 (363).The identification response message comprises basic security identifier (KSIASME) and basic security key (KASME) security information as UE.KASME (key access security management entity) is used to generate the safe key (KNASenc) of the encipherment protection that is used for NAS message, the enode b key (KeNB) that is used for the NAS Integrity Key (KNASint) of integrity protection and is used to protect access aspect (AS) message.When receiving the identification response message, new MME 334 uses old key to explain the connection request message (365) that is sent in step 351 by UE 310.Old key comprises NAS safe key (KNASenc) and the NAS Integrity Key (KNASint) that is used for protecting the NAS message that the communication between UE 310 and old MME 314 uses.After using old key explanation connection request message, the connection that new MME 334 will use old key to carry out safeguard protection is accepted message and is sent to UE 310 (371).
In the program of situation 1, with mode execution in step 351 and the step 361 to 365 identical with situation 2.Yet when explaining that in step 365 the old key of use carries out the connection request message failure of safeguard protection, new MME 334 sends the user authentication request message to UE 310 (381).User authentication request message comprises authentication vector, i.e. AUTN (authentication marks) and authenticate key identifier (KSIASME).In response to user authentication request message, UE 310 sends user authentication response message to new MME 334 (383).
When utilizing the authentification of user message successfully to carry out authentification of user, MME 334 generates cryptographic key (KNASenc) and Integrity Key (KNASint) (385).Next, new MME 334 sends to UE 310 (387) with the NAS Security Mode Command message.The NAS Security Mode Command message comprises safe key identifier (key set index), conduct about UE security capabilities, the cryptographic algorithm that will use of the information of the security algorithm that UE supported and the integral algorithm that will use.When receiving the NAS Security Mode Command message, UE 310 generates cryptographic key (KNASenc) and Integrity Key (KNASint) (389) based on the KASME by the KSI index, and the result is with new MME 334 shared identical key values (389).Next, UE 310 finishes message with safe mode and sends to new MME 334, to finish NAS safe mode command program.Then, new MME 334 will accept message by the connection of safe key-be KNASenc or KNASint-protection and send to UE 310 (395) as connecting login response.
In the program of situation 3, execution in step 351, step 361 to 365, step 381 and step 391 by this way: when execution in step 371 to 191 when using old key to explain the result of connection request message, new MME 334 authenticated user failure.Be different from situation 2, in situation 3, when the arbitrary step authentication procedure failure in step 381 and step 383, even perhaps authentication procedure success, but during arbitrary step safe mode command (SMC) procedure failure in step 367 to 391, UE 310 also has different safe keys with new MME 334.In this case, new MME 334 sends to UE 310 (399) with connection refused message.
To describe the such situation of guiding, if promptly receive state-transition message (, switching, TAU and connection (disconnection) request message) here, then new MME receives old key from old MME, and uses old key to explain corresponding request message.Yet MME can generate new key and utilize new key to explain message, and need not to utilize old key to explain the process of message.That is to say, when receiving state-transition message (here, switch TAU, connection (disconnection) request message) time, MME can generate new key to handle request message, and need not request message interpretation process (step 151 of Fig. 2, step 153 and step 163 based on old key, the step 253 of Fig. 4, step 255, step 257 and step 259, and the step 361 of Fig. 6, step 363, step 365 and step 371).
Fig. 7 to 9 is illustration flow charts according to mobility, position and the login management program of MME in the mobile communication system of the embodiment of the invention.Figure 10 is the flow chart of illustration according to mobility, position and the login management program of UE in the mobile communication system of the embodiment of the invention.Though pay close attention to the situation that MME explains the message that is sent by UE with reference to the description that figure 7 to 10 makes, the present invention can be applied to the situation that UE explains the message that is sent by MME, unless operating characteristics is mutually the same.Except the context that the operation for MME shown in Fig. 7 to 10 and UE will exchange, here will be omitted about the detailed description of message.
With reference to figure 7 to 9, the NAS agreement is used for supporting the hypervisor between aforementioned UE and the MME.The NAS agreement comprises the NAS agreement of safeguard protection and does not have the NAS agreement of safeguard protection, and exists EPS mobile management (EMM) NAS message and EPS session management (ESM) NAS message to be used to support EPS NAS agreement.If receive request message (handoff request, TAU request or connect (disconnections) ask), the kind of MME analysis request (401) then, and what depend on reception is which message (i.e. switching, location management, login request message) is operated.
If determine to receive handoff request message in step 401, then program advances to step 411, thereby MME carries out the relevant processing of switching.In an embodiment of the present invention, suppose in the environment of Fig. 1 that UE 110 is from moving to the network N W 2 143 under MME 134 controls at the network N W 1 141 under MME 114 controls.Though, also MME can be transformed into another MME and not change and serve GW for switching, can exist service GW to be switched to the situation of another GW.
Under situation about switching, serving MME (or old MME) 114 sends to target MME by FORWARDRELOCATION REQUEST/RESPONSE (pass on and reorientate request) message with the information of relevant UE.This information comprises the parameter that safety is relevant, i.e. KSI (key set identifier), parameters for authentication or authentication vector, and the safe key that comprises NAS KSI (key set identifier), NAS cryptographic key (KNASenc) or Integrity Key (KNASint).Target MME determines whether to carry out new authentification of user and/or the safe mode command program (413) with UE.If determine new authentication procedure and/or safe mode command (SMC) program of execution and UE, the then safe key of the MME parameter that obtains by authentication procedure or safe mode command program to comprise that new safety is relevant, i.e. KSI (key set identifier), parameters for authentication or authentication vector, NAS KSI (key set identifier) and NAS cryptographic key (KNASenc) or Integrity Key (KNASint).
Therefore; if determine to carry out authentication, SMC or NAS SMC program; then target MME receive TRACKING AREA UPDATE REQUEST (tracking area update request) (below; be called the TAU request) NAS message, this message uses the safe key that comprises NAS KSI (key set identifier), NAS cryptographic key (KNASenc) or Integrity Key (KNASint) from UE to carry out safeguard protection (415).When receiving TAU request NAS message, MME key safe in utilization is explained TAUREQUES message, this safe key comprises the parameter that new safety is relevant, i.e. KSI (key set identifier), parameters for authentication or authentication vector, NAS KSI (key set identifier) and NAS cryptographic key (KNASenc) or Integrity Key (KNASint) (417).
If determine not carry out authentication, SMC and NAS SMC; then MME receives the TAU REQUEST message of using old key to carry out safeguard protection; described old key is included in the security parameter that uses between MME and the UE; that is, from UE all as usual KSI (key set identifier), old parameters for authentication or authentication vector, old NAS KSI (key set identifier) and the old parameter of old NAS cryptographic key (KNASenc) or old Integrity Key (KNASint) and so on.Next, MME uses old safe key to explain TAU REQUEST message, described old safe key is included in the security parameter that uses between MME and the UE, that is, all as usual KSI (key set identifier), old parameters for authentication or authentication vector, old NAS KSI (key set identifier) and the old parameter of old NAS cryptographic key (KNASenc) or old Integrity Key (KNASint) and so on.
If determine to receive TRACKING AREA UPDATE (tracking area update) (below, be called TAU) message in step 401, then program advances to step 431, handles thereby target MME carries out TAUREQUEST.TAU REQUEST message uses old safe key to carry out safeguard protection; described old safe key is included between old serving MME and the UE 110 the old security parameter that uses, such as KSI (key set identifier), old parameters for authentication or authentication vector, old NAS KSI (key set identifier) and old NAS cryptographic key (KNASenc) or old Integrity Key (KNASint).In this case, new MME receives the relevant parameter of safety by CONTEXT RESPONSE (context response) message from old MME.In order to receive security parameter from old MME, new MME must know old MME and UE.That is to say; when receiving TAU REQUEST message in step 431; in order to discern old MME and UE; new MME must know last visit login tracing area sign (Tracking area identity) (TAI) and the UE identifier; it is old global unique temporary identity symbol (GUTI); though carry out safeguard protection, cannot encrypt, thereby new MME can be to old MME request security parameter information.When in step 433 when old MME receives security parameter (NAS KSI, key, parameters for authentication and KSI), new MME utilizes old security parameter (NAS key, parameters for authentication and the KSI of old MME) to explain TAU REQUEST message (435).
Whether next, new MME decision carries out authentication procedure (437).If the integrity checking failure, then new MME carries out authentication procedure.Particularly, when when step 435 safety certification is failed, new MME must carry out authentication procedure in step 439.If carry out authentication, NAS SMC or SMC program in step 439 decision, then new MME will use TAUACCEPT (TAU acceptance) message of new security parameter protection to send to UE (441).Otherwise if do not carry out authentication, NAS SMC or SMC program in step 439 decision, then new MME will use the TAUACCEPT message of old security parameter protection to send to UE (443).
If determine to receive connection request message in step 401, then program advances to step 461, thereby new MME carries out the processing of join dependency.Use old safe key to protect in the ATTACH REQUEST message that step 460 receives; described old safe key is included in the old security parameter that uses between old serving MME and the UE, such as KSI (key set identifier), old parameters for authentication or authentication vector, old NAS KSI (key set identifier) and old NAS cryptographic key (KNASenc) or old Integrity Key (KNASint).In this case, new MME determines whether to have the security parameter (463) of UE 110, and if have, then utilize this security parameter to explain ATTACH REQUEST message (469).If program proceeds to step 469 from step 463, this means that UE has signed in to new MME, but disconnect for a certain reason, and UE shares the relevant parameter of identical safety with MME.If new MME does not have the security parameter of UE, then new MME determines whether and can obtain the relevant parameter (465) of new safety from old MME.If can not obtain the relevant parameter of safety from old MME, then new MME message interpretation failure, and therefore send error message to UE (479).This is to send the message that does not have the message of safeguard protection or resend safeguard protection for UE.
When receiving relevant safely parameter from old MME (467), use the security parameter information that sends by old MME to explain ATTACH REQUEST message at the new MME of step 469.In order to obtain security parameter in step 469 from old MME, new MME must know old MME and corresponding UE when step 461 receives ATTACH REQUEST message.Such information can with about the TAI and the UE identifier of the login of the last visit of GUTI, be that the knowledge of old GUTI obtains, though and by safeguard protection, it cannot be encrypted, thereby new MME can be to old MME request security parameter information.
Next, authentication (471) is carried out in new MME decision, so authentication procedure begins (473), thus, particularly when safety certification when step 469 is failed, new MME is at step 473 execution security procedure.Carry out in step 473 under the situation of authentication, NAS SMC or SMC program, new MME uses new security parameter to send and receives NAS message (475).Do not carry out in step 473 under the situation of authentication, NAS SMC or SMC program, new MME uses old security parameter to send and receives NAS message (477).
Figure 10 is the flow chart of illustration according to the program of mobility, position and the login management of supporting UE in the mobile communication system of the embodiment of the invention.Description pay close attention to be used to generate, send/receive and authenticate the process of NAS message.
With reference to Figure 10, UE determines whether it has safe key, and this safe key comprises available KSI (key set identifier), parameters for authentication or authentication vector, NAS KSI (key set identifier), NAS cryptographic key (KNASenc) or Integrity Key (KNASint) (501).Here, KSI is the identifier of key of the middle use of the authentication procedure between UE and MME, and that parameters for authentication or authentication vector are authentication procedures is necessary.And, NAS KSI is the identifier that is used to distinguish the key that will be used to encrypt NAS message, key is the relevant key of safety, also be UE and MME cipher key shared, utilize NAS message to communicate the relevant key of necessary NAS safety such as UE and MME, i.e. NAS cryptographic key (KNASenc) or Integrity Key (KNASint).Here, KSI is identical with NAS KSI.KSI can be KSIASME or the KSISGSN value of using in switching situation.That is to say that KSIAME basic security identifier is used for discerning basic security key K ASME, and since NAS cryptographic key (KNASenc) or Integrity Key (KNASint) generate from basic security key K ASME, so KSI equals NAS KSI.Under the situation of the KSISGSN that the GERAN/UTRAN that from KSI is not KSIASME uses to the switching situation of the E-UTRAN of 3GPP LTE, KSIAME basic security identifier is the value relevant with K ' ASME that generates from cryptographic key (CK) and Integrity Key (IK), promptly by new authentication procedure or by be mapped to EPS SECURITY CONTEXT (EPS safe context) generation with key K ' value that ASME is relevant.Therefore, if in step 501, UE does not have the relevant value of available safety; particularly; the safe key that NAS KSI or NAS are relevant, i.e. NAS cryptographic key (KNASenc) or Integrity Key (KNASint), then UE sends the NAS message (513) that does not have safeguard protection.If UE has the relevant safe key of available NAS KSI or NAS, then UE determines whether to send the message of safeguard protection, and if UE do not want to send the message of safeguard protection, then program advances to step 513.
If want to send the message of safeguard protection, then UE uses KSI (key set identifier), parameters for authentication or authentication vector, NAS KSI (key set identifier) and safe key to generate NAS message, and sends NAS message.Next, UE receives the relevant parameter (507) of new safety that is used for MME.Here, the parameter that safety is relevant comprises KSI (key set identifier), parameters for authentication or authentication vector, NASKSI (key set identifier), NAS cryptographic key (KNASenc) or Integrity Key (KNASint).The parameter that such safety is relevant can obtain from MME by authentication procedure or safe mode command program.After execution in step 507, the relevant parameter of safety that the UE checking is new, be safe key, comprise KSI (key set identifier), parameters for authentication or authentication vector, NAS KSI (key set identifier), NAS cryptographic key (KNASenc) or Integrity Key (KNASint) (509).After proof procedure, UE uses the relevant parameter of new safety to generate and send NAS message (511).
Though describe one exemplary embodiment of the present invention in detail above, it should be clearly understood that, it will be apparent to one skilled in the art that, many variations of Jiao Dao basic inventive concept here and/or modification will drop in the spirit and scope of the present invention, and the spirit and scope of the present invention limit in claims.

Claims (16)

1. method that is used for handling in mobile communication system the state information of UE comprises:
At the UE place, to new MME transmit status conversion request message;
At new MME place, receive old key information from old MME; And
At new MME place, after using old key information analysis request message, send response message to UE.
2. the method for claim 1, wherein described old key information comprises KSIasme and Kaseme.
3. the method for claim 1 also comprises:
At new MME place, send the NAS Security Mode Command message that comprises the new key information that when explaining the request message failure, generates to UE; And
At the UE place, send the response of the NAS Security Mode Command message that generates for the new key information that utilizes UE to new MME.
4. method as claimed in claim 3, wherein, the new key information that is generated by new MME comprises NAS cryptographic key (KNASenc) and Integrity Key (KNAsint); The NAS Security Mode Command message comprises secure identifier (KSI), UE security capabilities, the cryptographic algorithm that will use and integral algorithm; And comprise cryptographic key (KNASenc) and the Integrity Key (KNASint) that generates based on basic security key (KASME) by the new key information that UE generates by secure identifier (KSI) index of NAS Security Mode Command message.
5. method as claimed in claim 3 also comprises: at new MME place, when utilizing old key to explain the request message failure, send user authentication request message, and reply this user authentication request message at the UE place.
6. method as claimed in claim 5, wherein, described user authentication request message comprises authentication vector (AUTN) and safe key identifier (KSIASME).
7. as any one described method in the claim 1,3 and 5, wherein, described state exchange request message is handoff request message, TAU request message and is connected in (disconnection) request message one.
8. method that is used for handling in mobile communication system the state information of UE comprises:
At the UE place, utilize new key to carry out the state exchange request message of safeguard protection to new MME transmission;
At new MME place, by sending user authentication request message, response status conversion request message to new MME;
At new MME place, generate new key, and have the NAS Security Mode Command message of new key to the UE transmission; And
At the UE place,, and reply the NAS Security Mode Command message based on the new new key of key information generation of new MME.
9. method as claimed in claim 8, wherein, the new key information that is generated by new MME comprises NAS cryptographic key (KNASenc) and Integrity Key (KNAsint); The NAS Security Mode Command message comprises secure identifier (KSI), UE security capabilities, the cryptographic algorithm that will use and integral algorithm; And comprise cryptographic key (KNASenc) and the Integrity Key (KNASint) that generates based on basic security key (KASME) by the new key information that UE generates by secure identifier (KSI) index of NAS Security Mode Command message.
10. method as claimed in claim 9, wherein, described user authentication request message comprises authentication vector (AUTN) and secure identifier (KSIASME).
11. one kind is used for handling the method for switching in mobile communication system, comprises:
At old MME place, send passing on of old key information to new MME and reorientate request message with UE;
At the UE place, utilize old key to carry out the TAU request message of safeguard protection to new MME transmission;
At new MME place, utilize old key to explain the TAU request message.
12. method as claimed in claim 11 also comprises:
At new MME place, when utilizing old key to explain the failure of TAU request message, send user authentication request message, and reply this user authentication request message at the UE place;
At new MME place, generate new key, and send the NAS Security Mode Command message that has about the information of new key to UE;
At the UE place, use the new key information of new MME to generate new key, and reply the NAS Security Mode Command message; And
At the UE place, send the TAU request message that utilizes new key to carry out safeguard protection to new MME, and utilize the described message of new key handling at new MME place.
13. a position method for updating that is used for handling in mobile communication system UE comprises:
At the UE place, utilize old key to carry out the TAU request message of safeguard protection to new MME transmission;
At new MME place,, and receive old key information to the old MME request information relevant with the old key of UE; And
At new MME place, utilize old key to explain the TAU request message, and accept message with the TAU that old key carries out safeguard protection to the UE transmission.
14. method as claimed in claim 13 also comprises:
At new MME place, when utilizing old key to explain the failure of TAU request message, send user authentication request message, and reply this user authentication request at the UE place;
Generate new key at new MME place, and send the NAS Security Mode Command message that has about the information of new key to UE;
At the UE place,, and reply the NAS Security Mode Command message based on the new new key of key information generation of new MME; And
Send the TAU request message that utilizes new key to carry out safeguard protection at the UE place to new MME, and utilize the described message of new key handling at new MME place.
15. a method that is used for handling in mobile communication system the login of UE comprises:
At the UE place, utilize old key to carry out the login request message of safeguard protection to new MME transmission;
At new MME place,, and receive old key information to the old MME request information relevant with the old key of UE; And
At new MME place, explain described login request message, and accept message to the login that the UE transmission utilizes old key to carry out safeguard protection.
16. method as claimed in claim 15 also comprises:
At new MME place, when utilizing old key to explain the login request message failure, send user authentication request message, and reply this user authentication request message;
At new MME place, generate new key, and send the NAS Security Mode Command message that has about the information of new key to UE;
At the UE place,, and reply the NAS Security Mode Command message based on the new new key of key information generation of new MME; And
At the UE place, send the login request message of utilizing new key to carry out safeguard protection to new MME, and utilize the described message of new key handling at new MME place.
CN200980140975.1A 2008-08-15 2009-08-14 Security protected non-access stratum protocol operation supporting method in a mobile telecommunication system Active CN102187599B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
KR10-2008-0080205 2008-08-15
KR20080080205 2008-08-15
PCT/KR2009/004570 WO2010019020A2 (en) 2008-08-15 2009-08-14 Security protected non-access stratum protocol operation supporting method in a mobile telecommunication system

Publications (2)

Publication Number Publication Date
CN102187599A true CN102187599A (en) 2011-09-14
CN102187599B CN102187599B (en) 2015-04-01

Family

ID=41669507

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200980140975.1A Active CN102187599B (en) 2008-08-15 2009-08-14 Security protected non-access stratum protocol operation supporting method in a mobile telecommunication system

Country Status (6)

Country Link
US (1) US8638936B2 (en)
EP (2) EP3554113A1 (en)
JP (1) JP5390611B2 (en)
KR (1) KR101579757B1 (en)
CN (1) CN102187599B (en)
WO (1) WO2010019020A2 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102572816A (en) * 2011-12-27 2012-07-11 电信科学技术研究院 Method and device for mobile switching
WO2013040962A1 (en) * 2011-09-23 2013-03-28 电信科学技术研究院 Data sending and receiving method and device
CN105578456A (en) * 2014-10-14 2016-05-11 成都鼎桥通信技术有限公司 End-to-end encryption method for TD-LTE cluster communication system, equipment, and system
CN108924841A (en) * 2017-03-20 2018-11-30 ***通信有限公司研究院 Method for security protection, device, mobile terminal, base station and MME equipment
CN109586913A (en) * 2017-09-28 2019-04-05 ***通信有限公司研究院 Safety certifying method, safety certification device, communication equipment and storage medium
CN110249584A (en) * 2017-01-27 2019-09-17 三星电子株式会社 For providing the method for End-to-End Security by signaling plane in task critical data communication system
CN113170369A (en) * 2018-10-04 2021-07-23 诺基亚技术有限公司 Method and apparatus for security context handling during an intersystem change

Families Citing this family (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10341910B2 (en) 2009-06-16 2019-07-02 Blackberry Limited Method for accessing a service unavailable through a network cell
US8861433B2 (en) 2009-06-16 2014-10-14 Blackberry Limited Method for accessing a service unavailable through a network cell
ES2694393T3 (en) 2009-06-16 2018-12-20 Blackberry Limited Method to access a service not available through a network cell
DE102009029828B4 (en) * 2009-06-18 2011-09-01 Gigaset Communications Gmbh DEFAULT encryption
EP2567499B1 (en) 2010-05-04 2016-10-26 Qualcomm Incorporated Shared circuit switched security context
WO2011152665A2 (en) * 2010-06-01 2011-12-08 Samsung Electronics Co., Ltd. Method and system of securing group communication in a machine-to-machine communication environment
JP4892084B2 (en) * 2010-06-16 2012-03-07 株式会社エヌ・ティ・ティ・ドコモ Mobile communication method
KR101737425B1 (en) * 2010-06-21 2017-05-18 삼성전자주식회사 Mehthod and apparatus for managing security in a mobiel communication system supporting emergency call
KR101712865B1 (en) * 2010-09-09 2017-03-08 삼성전자주식회사 Communication supporting method and apparatus using non-access stratum protocol in mobile telecommunication system
US8929334B2 (en) 2010-11-16 2015-01-06 Qualcomm Incorporated Systems and methods for non-optimized handoff
US8743828B2 (en) 2010-11-16 2014-06-03 Qualcomm Incorporated Systems and methods for non-optimized handoff
EP3606001A1 (en) * 2013-01-10 2020-02-05 NEC Corporation Mtc key management for key derivation at both ue and network
WO2015015714A1 (en) * 2013-07-31 2015-02-05 Nec Corporation Devices and method for mtc group key management
CN104581652B (en) 2013-10-15 2018-12-07 华为技术有限公司 Message treatment method, the method and apparatus for selecting MME
US9955393B2 (en) * 2014-05-08 2018-04-24 Interdigital Patent Holdings, Inc. Methods and apparatus for selection of dedicated core network
KR102102858B1 (en) * 2014-05-13 2020-04-23 주식회사 케이티 System with simplified authentication procedure when transitioning from WCDMA network into LTE network
US10104603B2 (en) 2014-05-30 2018-10-16 Nec Corporation Apparatus, system and method for dedicated core network
US9693219B2 (en) 2014-10-24 2017-06-27 Ibasis, Inc. User profile conversion to support roaming
US9585013B2 (en) * 2014-10-29 2017-02-28 Alcatel Lucent Generation of multiple shared keys by user equipment and base station using key expansion multiplier
EP3547739A1 (en) * 2015-02-13 2019-10-02 NEC Corporation Apparatus, system and method for security management
RU2017132104A (en) * 2015-02-16 2019-03-18 Нек Корпорейшн COMMUNICATION SYSTEM, NODE DEVICE, COMMUNICATION TERMINAL, KEY CONTROL METHOD AND ENERGY INDEPENDENT READABLE COMPUTER READABLE MEDIA ON WHICH THE PROGRAM IS STORED
US9686675B2 (en) * 2015-03-30 2017-06-20 Netscout Systems Texas, Llc Systems, methods and devices for deriving subscriber and device identifiers in a communication network
US9883385B2 (en) 2015-09-15 2018-01-30 Qualcomm Incorporated Apparatus and method for mobility procedure involving mobility management entity relocation
US10334435B2 (en) 2016-04-27 2019-06-25 Qualcomm Incorporated Enhanced non-access stratum security
EP3479614A4 (en) * 2016-07-01 2019-11-27 Nokia Technologies Oy Secure communications
US20170013651A1 (en) * 2016-09-22 2017-01-12 Mediatek Singapore Pte. Ltd. NAS Security And Handling Of Multiple Initial NAS Messages
JP6763435B2 (en) * 2016-10-26 2020-09-30 日本電気株式会社 Source core network nodes, terminals, and methods
EP3574669B1 (en) * 2017-01-30 2021-10-13 Telefonaktiebolaget LM Ericsson (Publ) Security context handling in 5g during connected mode
CN109314861B (en) * 2017-05-04 2021-09-07 华为技术有限公司 Method, device and communication system for obtaining secret key
CN116866905A (en) * 2017-09-27 2023-10-10 日本电气株式会社 Communication terminal and method of communication terminal
CN109803333B (en) * 2017-11-17 2022-04-19 中兴通讯股份有限公司 Coupling redirection method and device
US10542428B2 (en) 2017-11-20 2020-01-21 Telefonaktiebolaget Lm Ericsson (Publ) Security context handling in 5G during handover
CN110099382B (en) * 2018-01-30 2020-12-18 华为技术有限公司 Message protection method and device
KR102405412B1 (en) * 2018-04-06 2022-06-07 삼성전자주식회사 Apparatus and method for security of information in wireless communication
KR102425582B1 (en) * 2018-05-11 2022-07-26 삼성전자주식회사 Apparatus and method for security protection in wireless communication system
KR102449988B1 (en) * 2018-06-29 2022-10-05 삼성전자주식회사 Apparatus and method for data communication in wireless communication system
US11689920B2 (en) * 2018-09-24 2023-06-27 Nokia Technologies Oy System and method for security protection of NAS messages
US20220338071A1 (en) * 2019-09-25 2022-10-20 Samsung Electronics Co., Ltd. Method and device for performing communication in wireless communication system
CN110933669A (en) * 2019-11-21 2020-03-27 北京长焜科技有限公司 Method for quickly registering cross-RAT user
EP4064748A4 (en) * 2019-12-13 2022-11-16 Huawei Technologies Co., Ltd. Communication method, apparatus and system
CN115362702A (en) * 2020-04-07 2022-11-18 苹果公司 Tracking Area Identifier (TAI) change during authentication request processing
KR102279293B1 (en) 2020-08-07 2021-07-20 한국인터넷진흥원 Method and apparatus for detecting null-ciphering channels

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070249352A1 (en) * 2006-03-31 2007-10-25 Samsung Electronics Co., Ltd. System and method for optimizing authentication procedure during inter access system handovers
US20080025263A1 (en) * 2006-06-16 2008-01-31 Nokia Corporation Apparatus and method for transferring PDP context information for a terminal in the case of intersystem handover

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR19990004237A (en) * 1997-06-27 1999-01-15 김영환 Apparatus and method for encrypting / decrypting data in asynchronous transmission mode network
FI111423B (en) * 2000-11-28 2003-07-15 Nokia Corp A system for securing post-handover communications
US8127136B2 (en) * 2004-08-25 2012-02-28 Samsung Electronics Co., Ltd Method for security association negotiation with extensible authentication protocol in wireless portable internet system
JP2009525681A (en) * 2006-01-31 2009-07-09 インターデイジタル テクノロジー コーポレーション Method and system for performing cell update and RA (routing area) update procedures while a WTRU (Wireless Transmit Receive Unit) is in a standby state
GB0619409D0 (en) * 2006-10-02 2006-11-08 Vodafone Plc Telecommunications networks
EP1914930A1 (en) * 2006-10-17 2008-04-23 Matsushita Electric Industrial Co., Ltd. User plane entity selection in a mobile communication system having overlapping pool areas
CA2665452C (en) * 2006-10-31 2016-01-05 Qualcomm Incorporated Inter-enode b handover procedure
FI20075297A0 (en) * 2007-04-27 2007-04-27 Nokia Siemens Networks Oy Method, radio system and base station

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070249352A1 (en) * 2006-03-31 2007-10-25 Samsung Electronics Co., Ltd. System and method for optimizing authentication procedure during inter access system handovers
US20080025263A1 (en) * 2006-06-16 2008-01-31 Nokia Corporation Apparatus and method for transferring PDP context information for a terminal in the case of intersystem handover

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
NOKIA 等: "《3GPP TSG SA WG3 Security — SA3#51》", 18 April 2008 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013040962A1 (en) * 2011-09-23 2013-03-28 电信科学技术研究院 Data sending and receiving method and device
CN102572816A (en) * 2011-12-27 2012-07-11 电信科学技术研究院 Method and device for mobile switching
CN102572816B (en) * 2011-12-27 2014-08-06 电信科学技术研究院 Method and device for mobile switching
CN105578456A (en) * 2014-10-14 2016-05-11 成都鼎桥通信技术有限公司 End-to-end encryption method for TD-LTE cluster communication system, equipment, and system
CN105578456B (en) * 2014-10-14 2019-01-25 成都鼎桥通信技术有限公司 End to End Encryption method, equipment and the system of TD-LTE trunked communication system
US11770247B2 (en) 2017-01-27 2023-09-26 Samsung Electronics Co., Ltd. Method for providing end-to-end security over signaling plane in mission critical data communication system
US11316678B2 (en) 2017-01-27 2022-04-26 Samsung Electronics Co., Ltd. Method for providing end-to-end security over signaling plane in mission critical data communication system
CN110249584A (en) * 2017-01-27 2019-09-17 三星电子株式会社 For providing the method for End-to-End Security by signaling plane in task critical data communication system
CN110249584B (en) * 2017-01-27 2022-04-19 三星电子株式会社 Method for providing end-to-end security in mission critical data communication systems
CN108924841B (en) * 2017-03-20 2021-11-19 ***通信有限公司研究院 Security protection method and device, mobile terminal, base station and MME (mobility management entity) equipment
CN108924841A (en) * 2017-03-20 2018-11-30 ***通信有限公司研究院 Method for security protection, device, mobile terminal, base station and MME equipment
CN109586913B (en) * 2017-09-28 2022-04-01 ***通信有限公司研究院 Security authentication method, security authentication device, communication device, and storage medium
CN109586913A (en) * 2017-09-28 2019-04-05 ***通信有限公司研究院 Safety certifying method, safety certification device, communication equipment and storage medium
CN113170369A (en) * 2018-10-04 2021-07-23 诺基亚技术有限公司 Method and apparatus for security context handling during an intersystem change
CN113170369B (en) * 2018-10-04 2024-06-14 诺基亚技术有限公司 Method and apparatus for security context handling during intersystem changes

Also Published As

Publication number Publication date
JP2012500511A (en) 2012-01-05
EP2315371A2 (en) 2011-04-27
US20110142239A1 (en) 2011-06-16
WO2010019020A3 (en) 2010-07-22
KR101579757B1 (en) 2015-12-24
US8638936B2 (en) 2014-01-28
EP3554113A1 (en) 2019-10-16
WO2010019020A9 (en) 2010-09-10
WO2010019020A2 (en) 2010-02-18
JP5390611B2 (en) 2014-01-15
KR20100021385A (en) 2010-02-24
CN102187599B (en) 2015-04-01
EP2315371A4 (en) 2015-10-14

Similar Documents

Publication Publication Date Title
CN102187599B (en) Security protected non-access stratum protocol operation supporting method in a mobile telecommunication system
KR100480258B1 (en) Authentication method for fast hand over in wireless local area network
KR101467780B1 (en) Method for handover between heterogeneous radio access networks
US7200383B2 (en) Subscriber authentication for unlicensed mobile access signaling
US8295488B2 (en) Exchange of key material
US10320754B2 (en) Data transmission method and apparatus
WO2005027559A1 (en) Fast authentication method and apparatus for inter-domain handover
CN101946535A (en) System and method for performing handovers, or key management while performing handovers in a wireless communication system
JP2009533932A (en) Channel coupling mechanism based on parameter coupling in key derivation
JP2018523950A (en) Method and apparatus for direct communication key establishment
KR20080086127A (en) A method and apparatus of security and authentication for mobile telecommunication system
US20200389788A1 (en) Session Key Establishment
KR101460680B1 (en) Method for interworking among wireless technologies
US8819778B2 (en) Method and system for switching station in centralized WLAN when WPI is performed by access controller
US20110002272A1 (en) Communication apparatus and communication method
Kim et al. MoTH: mobile terminal handover security protocol for HUB switching based on 5G and beyond (5GB) P2MP backhaul environment
WO2017171835A1 (en) Key management for fast transitions
CN1997212A (en) Method for location update in the wireless communication network
CN1997213B (en) Method for security information acquisition of the switched target base station in the wireless communication system
Zheng et al. Handover keying and its uses
Liu et al. The untrusted handover security of the S-PMIPv6 on LTE-A
CN110830996A (en) Key updating method, network equipment and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant